Font Size: a A A

The Research And Implementation Of Method Of Ddos Check Based On Fuzzy Clustering Algorithms

Posted on:2014-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:H T FengFull Text:PDF
GTID:2268330428976472Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, with the development of computer technology, the computer network has already become the necessity which can’t be lacked in our lifetime. Although the computer plays a more and more important role, the problem of safety in network has become an important research subject. The type of attack of Distributed Denial of Service is outstanding in numerous Network attacks and intrusions. DDoS has huge destructions because it attacks target server by forging IP request data packet to operate many master end. The DDoS Attack can be divided into two types:attack of bandwidth exhausting and attack of resource exhausting. And it’s initiated by the tools of Trinoo,TFN2K and Stacheldraht. So it’s necessary and meaningful to check the type of attack of DDoS.This thesis introduces the research background, meanings of this subject and the current situation of research on attack of DDoS internally and externally at first. And it introduces the search content of this thesis and its organized structure. Then it introduces the principle of attack of DDoS, its attack course as well as its attack classification, lists the common attack of attack of DDoS tools and points out check index and check classification. After that it introduces the method of cluster in detail, and introduces a new improved method called IFCM cluster algorithm from common vague cluster algorithm called C_mean cluster algorithm. It completes the design of system with the general design,flow design and module design of system, and puts the IFCM cluster algorithm into the effect of system label and cluster check. Moreover it shows the implementation of server and router in detail in the environment of simulate network. Furthermore, it simulates the experiment and finishes the implementation of system, and analyses the results of experiment. It brings a new perspective of DDOS check in future at last.There are some defects in the method of DDoS check based on fuzzy clustering algorithms in the thesis. With the rapid development of network technology and the popularity of wireless network and mobile network in the future, the proposal of check of DDoS attack will be improved, and will have better effect on defence.
Keywords/Search Tags:Distributed Denial of Service, Fuzzy Clustering, Safety, Data standardization
PDF Full Text Request
Related items